{"version":"1.0","provider_name":"Cobweb MENA","provider_url":"https:\/\/cobweb.com\/ae","author_name":"anneaketch","author_url":"https:\/\/cobweb.com\/ae\/content-hub\/author\/anneaketch\/","title":"Upskill and Grow With Storyals & Cobweb","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"1HsY4BIAG6\"><a href=\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/key-differences-between-spam-and-phishing\/\">Key Differences Between Spam and Phishing<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cobweb.com\/ae\/content-hub\/blogs\/key-differences-between-spam-and-phishing\/embed\/#?secret=1HsY4BIAG6\" width=\"600\" height=\"338\" title=\"&#8220;Key Differences Between Spam and Phishing&#8221; &#8212; Cobweb MENA\" data-secret=\"1HsY4BIAG6\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/cobweb.com\/ae\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/cobweb.com\/ae\/wp-content\/uploads\/sites\/2\/2024\/01\/Storyals-banner.png","thumbnail_width":350,"thumbnail_height":300,"description":"While the internet has many benefits for modern businesses, there are also some issues to be aware of within the online space. With this, it\u2019s vital to be aware of the malicious actions that a bad-faith actor can take to, at worst, damage your company. Emails are one of the most vulnerable points at which your company could be in danger. With many different attacks and vulnerabilities involving social engineering, even a simple click on a link within an email could cause tons of damage. But some methods are more dangerous than others. In this article, we\u2019re going to go over the difference between spam emails and phishing emails, and how you can protect your business from them."}